Master of Science in Information Systems Security
Program Overview
Online Master's in Information Systems Security
Information Systems Security (INFOSEC) experts keep data safe and confidential, protecting both computer and communication information. INFOSEC mitigates the risks of storing and transferring data and ensures information stays private.
Types
- Master
Location
- Online
Credits
- 31
Cost
- $355/credit hour
Overview
Attacks are plenty, but defenders are few. Protecting data in a technology-filled society is essential for running any business or organization, but too few individuals accept the challenge of ensuring the safety of private information. What we’re saying is, INFOSEC needs you! With a Master of Science in Information Systems Security from University of the Cumberlands, you will become an expert in information preservation and restoration. Because of your expertise, you will be set apart in the job market, guaranteeing the chance for success no matter where you go. From security analyst to systems manager, you will have your pick of careers.
By the Numbers
- $102,600: Average Salary
- 35%: Industry Growth
- $10.4K: Average Financial Aid
- #1: in KY, INFOSEC Programs
Programs & Requirements
Master of Science in Information Systems Security
Our online MSISS program is intended for those who have earned their baccalaureate degree and already work in the information technology field. If you’re interested in continuing your education and enhancing your credentials, you’ll find that UC’s online information systems security degree program is built to help you achieve your goals. You’ll learn how to prevent or mitigate data loss by:
- Developing and implementing security policies
- Managing compliance with federal regulations for information security
- Creating disaster prevention and recovery plans
- Finding and preventing problems related to hardware, software, and networks
- Achieving availability, integrity, and confidentiality of information
- Implementing physical security measures to restrict access
- And much more!
The program is mapped directly to Department of Homeland Security (DHS) and National Security Agency (NSA) cyber security education standards. It also aligns with the (ISC)2 CISSP Common Body of Knowledge. CISSP (Certified Information Systems Security Professional) is an industry-leading professional certification for cyber security experts such as security practitioners, managers, and executives. Earning a Master of Science in Information Security Systems will equip you to take the CISSP certification exam. You’ll also graduate ready to pursue a new career path in INFOSEC or apply the latest information assurance and cyber security principles in your current role.
University of the Cumberlands has been named a National Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency (NSA) and the Department of Homeland Security (DHS). There are just over 200 universities nationwide with CAE-CD designation, and only two other universities in Kentucky included in this elite group.
Course Requirements
Master of Science in Information Systems Security (31 Hours)
- ISOL 531 - Access Control
- ISOL 532 - Telecommunications and Network Security
- ISOL 533 - Information Security and Risk Management
- ISOL 534 - Application Security
- ISOL 535 - Cryptography
- ISOL 536 - Security Architecture and Design
- ISOL 631 - Operations Security
- ISOL 632 - Business Continuity Planning and Disaster Recovery Planning
- ISOL 633 - Legal Regulations, Compliance, and Investigation
- ISOL 634 - Physical Security
- ISOL 699 - Info Security Project
Mission and Goals
UC’s information security program strives for excellence in creating, applying, and imparting knowledge in IT through comprehensive educational programs, research, dissemination, and service to professional societies, communities, states, and the nation.
- Knowledge to properly secure facilities, equipment and software.
- Ability to create and implement a plan to provide for disaster prevention and recovery.
- Practice using proper techniques for implementing security plans that ensure compliance with various laws.
- Practice identifying and investigating breaches in compliance.
- Confidence to address specific needs and challenges in the field of information security.
Career Outcomes
- Information Security Analyst: $102,600
- Computer and Information Systems Manager: $159,010
- IT Security Manager: $159,010
- Database Administrator: $101,000
- Network and Computer Systems Administrator: $80,600
- Computer Network Architect: $120,520
Faculty Experts
- Dr. Raed Sbeit, Associate Professor, School of Computer Information Sciences, Information Systems Security
Program Goals and Outcomes
- Goal 1: To prepare information technologists with the knowledge to properly secure facilities, equipment, networks, and software.
- PLO 1.1. Students manage access controls using best practices and technologies to help secure the network. (ISOL 531 Access Control)
- PLO 1.2. Students secure an application by applying proper security methods and parameters. (ISOL 534 Application Security)
- PLO 1.3. Students apply cryptography techniques to secure data. (ISOL 535 – Cryptography)
- PLO 1.4. Students recommend security strategies to minimize operational attacks. (ISOL 631 Operations Security)
- PLO 1.5. Students provide action plans and recommendations to secure a facility. (ISOL 634 Physical Security)
- Goal 2: To prepare information technologists with the knowledge to create and implement a plan for disaster prevention and recovery
- PLO 2.1. Students justify techniques for securing networks to minimize operational impacts when cyber-attacks occur. (ISOL 532 Telecommunications and Network Security)
- PLO 2.2. Students evaluate an organization’s infrastructure to prevent future security attacks. (ISOL 536 – Security Architecture and Design)
- PLO 2.3. Students examine risk management strategies for protecting assets. (ISOL 533 Information Security and Risk Management)
- PLO 2.4. Students develop a comprehensive plan to reduce the risks of a loss of business continuity. (ISOL 632 Business Continuity Planning and Disaster Recovery Planning)
- Goal 3: To prepare information technologists with the proper techniques for implementing security plans that ensure compliance with various laws and identifying and investigating breaches in compliance.
- PLO 3.1. Students determine which laws apply to different types of business environments. (ISOL 633 Legal Regulations, Compliance, and Investigations)
- Goal 4: To prepare information technologists to address specific needs and challenges in the field of Information Security.
- PLO 4.1. Students clearly assess IS security needs for an organization. (ISOL 699 Information Security Project)
Program Outline
Degree Overview:
Our online MSISS program is intended for those who have earned their baccalaureate degree and already work in the information technology field. If you’re interested in continuing your education and enhancing your credentials, you’ll find that UC’s online information systems security degree program is built to help you achieve your goals. You’ll learn how to prevent or mitigate data loss by: Developing and implementing security policies Managing compliance with federal regulations for information security Creating disaster prevention and recovery plans Finding and preventing problems related to hardware, software, and networks Achieving availability, integrity, and confidentiality of information Implementing physical security measures to restrict access And much more! The program is mapped directly to Department of Homeland Security (DHS) and National Security Agency (NSA) cyber security education standards. It also aligns with the (ISC)2 CISSP Common Body of Knowledge. CISSP (Certified Information Systems Security Professional) is an industry-leading professional certification for cyber security experts such as security practitioners, managers, and executives. Earning a Master of Science in Information Security Systems will equip you to take the CISSP certification exam. You’ll also graduate ready to pursue a new career path in INFOSEC or apply the latest information assurance and cyber security principles in your current role. University of the Cumberlands has been named a National Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency (NSA) and the Department of Homeland Security (DHS). There are just over 200 universities nationwide with CAE-CD designation, and only two other universities in Kentucky included in this elite group.
Outline:
Master of Science in Information Systems Security (31 Hours)
Course Requirements ISOL 531 – Access Control ISOL 532 – Telecommunications and Network Security ISOL ISOL 533 – Information Security and Risk Management ISOL 534 – Application Security ISOL 535 – Cryptography ISOL 536 – Security Architecture and Design ISOL 631 – Operations Security ISOL 632 – Business Continuity Planning and Disaster Recovery Planning ISOL 633 – Legal Regulations, Compliance, and Investigation ISOL 634 – Physical Security ISOL 699 – Information Security Project (1hr) … or...
Careers:
All stats from U.S. Bureau of Labor Statistics Information Security Analyst: $102,600 Information security analysts analyze current security measures and plan, organize, and implement new security protocols. Computer and Information Systems Manager: $159,010 Computer and information systems managers lead teams of information systems personnel, organize projects, and direct teams for projects. IT Security Manager: $159,010 IT security managers lead teams of information security personnel, organize projects, and direct teams for cyber security projects. Database Administrator: $101,000 Database administrators create, maintain, optimize, and secure databases to hold data for an organization. Network and Computer Systems Administrator: $80,600 Network and computer systems administrators are responsible for the daily operations of all network and computer systems under their direction. Computer Network Architect: $120,520 Network and computer systems administrators are responsible for the daily operations of all network and computer systems under their direction. Computer Network Architect: $120,520 Computer network architects design and build networks for communications. These may include LANs, WANs, and Intranets.